Windows 8/8.1 Virtual Desktop Optimization Guide. Prepared by: Worldwide Consulting Desktops and Apps Group

Size: px
Start display at page:

Download "Windows 8/8.1 Virtual Desktop Optimization Guide. Prepared by: Worldwide Consulting Desktops and Apps Group"

Transcription

1 Windows 8/8.1 Virtual Desktop Optimization Guide Prepared by: Worldwide Consulting Desktops and Apps Group

2 TABLE OF CONTENTS Overview... 3 Registry-Based Optimizations... 3 Optimization Testing... 4 Processor... 5 Memory... 5 Disk... 6 Network... 6 Optimizations... 7 Image Preparation... 7 Runtime Optimizations... 8 Services Scheduled Tasks General Recommendations System Performance User Experience Application Optimizations Revision History Contributors Feedback

3 Overview As organizations start to migrate to Windows 8 / 8.1, it is expected many will leverage desktop virtualization to simplify and streamline the migration and ongoing maintenance process. Delivering a Windows 8 / 8.1 system as a virtual desktop requires proper planning and configuration to provide the users with an optimized and functional desktop environment. The Windows 8 / 8.1 optimizations identified within this document are intended to provide a leaner and more responsive desktop for users. These configurations typically add value by enhancing the user experience and increasing system performance. For example, some of the changes optimize the user experience by enabling fast logons, reducing unnecessary prompts, and smoother screen updates. Others optimize performance and increase scalability by reducing unnecessary processor, memory, disk and network usage. However, certain optimizations allow for greater scalability but at the cost of the user experience. As many organizations will demand a user experience similar to the traditional desktop, care must be taken when applying optimization settings. Many of these settings are identified within the remainder of the document. Note: It is important that optimizations are thoroughly tested prior to being implemented in production. Most software vendors perform their testing using default rather than optimized desktops. Registry-Based Optimizations Many of the optimizations within this document require updates to be made to the computer or user portions of the registry. There are several techniques that can be used to apply these optimizations including updates to the default user hive, regedit, scripts, Group Policy Preference and third-party tools. The preferred option is to use Group Policy Preference so that registry-based optimizations can be applied without updating the master image or having to run a script each time a computer starts or a user logs on. For more information on Group Policy Preference, please refer to the Microsoft TechNet article Configure a Registry Item. Caution: Modifying the registry incorrectly can cause serious problems that may require you to reinstall the operating system. Citrix cannot guarantee that problems resulting from incorrectly modifying the registry can be solved. Modify the registry at your own risk. Backup the registry or disk image before making changes. 3

4 Optimization Testing A XenDesktop 7.1 environment was built to determine the performance gains that these settings can help achieve. A baseline was established by testing a Windows 8.1 x64 image with the optimizations that are included in the XenDesktop VDA installation by default (many of which are noted in this document). Additional tests were then performed with the recommendations in this document applied. Metrics were captured using Microsoft Performance Monitor. Note: Not all of the effects of the optimizations in this guide could be captured due to the nature of the testing. These include boot time optimizations and the effects of anti-virus exclusions. Results may vary depending on your environment and image delivery solution. The table below summarizes the base hardware and machine resources used in testing the optimizations in this guide as well as the baseline desktop performance. Test Environment Model Processor Memory Storage Hypervisor Number of desktops per test run 80 vcpu per desktop 2 Memory assigned per desktop HP BL460c Gen8 16 Core Intel 2.60 GHz 192 GB EMC VNX5500 Storage Array Hyper-V 3 on Server 2012 R2 2GB (Static) Delivery method Provisioning Services 7.1 Table 1 Test Environment The table below summarizes the performance gains achieved from applying the optimizations documented within this guide. The testing was done using leveraging the LoginVSI 4.0 Medium workload. For official documentation on LoginVSI, please refer to their website. Metric Default Average Optimized Average % Improvement Hypervisor % Total Runtime 55% 42% 24% Hypervisor Context Switches 201, ,000 12% Disk Mbytes Total/Sec % Disk Transfers/Sec % VM Available Memory (MB) % Guest Machine Network Traffic (Mbps) % Table 2 Performance Metrics 4

5 Processor The graphic below shows that the CPU utilization was substantially lower for the optimized tests throughout the entire Login VSI Medium workload. This is consistent throughout the login process and remains during steady-state processing. Memory Figure 1 Total CPU % Runtime on the Hyper-V Host The graphic below shows a comparison of available memory consistent with all the virtual desktops tested. Each machine was given 2GB of statically allocated memory. As can be seen below the Optimized desktop had almost 200MB of additional memory through the entire LoginVSI 4.0 Medium workload. Figure 2 Available memory on the Windows 8.1 Desktop 5

6 Disk Below is a graphic showing the total disk Mbytes/sec on the Provisioning Services write cache storage hosted in an EMC storage array. The test runs using the optimized image consistently stressed the storage less than the test runs using the default image. Note that in the image below the majority (>90%) of the disk operations were write operations. This is typical in a Provisioning Services deployment. Network Figure 3 Total Disk MBytes/Sec on the write cache storage The network traffic pictured below is the total traffic to and from the desktops. It includes the streaming traffic of the vdisk through Provisioning Services as well as the video streaming throughout the workload. As can be seen below, the network traffic is consistently lower for the test runs using the optimized image. Figure 4 Total guest network traffic for 80 Windows 8.1 desktops 6

7 Optimizations Image Preparation The following tasks should be performed for each Machine Creation Services or Provisioning Services master image. If no desktop provisioning technology is used, these tasks should be performed on all virtual desktops. Item Configuration / Registry Key Description/Justification During initial installation Prevent creation of BitLocker drive (350MB) (Done before OS installation) Remove unnecessary Windows features Before rolling out to production 1. Press Shift+F10 to open CMD 2. Type diskpart to enter the utility 3. Type list disk to see the disks available 4. Select the disk to create the partition, for example select disk 0 5. Type create partition primary to create a partition without the 350MB Bitlocker drive 6. Exit diskpart and continue with normal installation Windows 8: Control Panel > Programs and Features Bitlocker drive is not needed in virtual desktop environment. Drive can be removed to minimize disk space requirements. Can be done manually or through MDT Understand (and Get Rid of) the Mysterious Small Partition Minimizes disk space requirements. Reboot the virtual machine at least two times Update virus definitions and perform a full scan for viruses on all local hard disks - Ensures that pending installations, file updates and configurations are complete. - Ensures that the golden image does not contain any viruses. Also minimizes the virus scanner overhead during normal runtime since files which have already been scanned will not be scanned again if not changed (in some scenarios). Run the Disk Cleanup Wizard Defragment the hard disk Disk Properties > Disk Cleanup Windows Explorer > Optimize Drives Wizard Clean up files and system restore points to minimize disk space requirements. Disk defragmentation should be completed before the initial rollout and at regular intervals to ensure that the disk is optimized, for example following updates to a golden PVS or MCS image. When a scheduled defragmentation is used for example in a persistent desktop ensure that the schedule does not conflict with business times (default is every Wednesday at 1am). Table 3: Image Preparation 7

8 Runtime Optimizations The following optimizations can help to improve performance and scalability. These optimizations should be considered for each Machine Creation Services or Provisioning Services master image. If no desktop provisioning technology is used, these tasks should be performed on all virtual desktops unless specifically noted. Note: Optimizations marked 1 are applied automatically during the XenDekstop VDA installation as outlined in CTX Note: Optimizations marked 2 should be applied to non-persistent desktops only. Item Configuration / Registry Key Description/Justification Disable Last Access Timestamps 1 Disable default system screensaver Disable bootlog and boot animation [HKEY_LOCAL_MACHINE\SYSTEM\C urrentcontrolset\control\filesystem] "NtfsDisableLastAccessUpdate"= dword: HKEY_USERS\.DEFAULT\Control Panel\Desktop ScreenSaveActive"=dword: bcdedit /set {default} bootlog no bcdedit /set {default} quietboot yes Disabling the last access timestamp will help to minimize I/O operations. This setting disables the screensaver when no user is logged on. This will save system resources when no users are logged into the desktop. Disabling the boot animation, which no user will see, helps to speed up the boot process. Enable High Performance scheme in Windows Power Plans Select the High Performance power plan under Control Panel\System and Security\Power Options Or alternatively run command powercfg -s 8c5e7fda-e8bf-4a96-9a85- a6e23a8c635c Note: Disabling the boot animation disables all UI feedback until the Windows logon screen appears. This behavior can increase troubleshooting complexity. Processors are always locked at the highest performance state. Antivirus Follow the best practices outlined in CTX Guidelines for Antivirus Software Configuration. 8

9 Page File Disable unnecessary Desktop Notification Icons My Computer Properties à Advanced à Performance Settings à Advanced tab à Change Virtual Memory Set the initial size to be equal to the maximum size. Manually remove the components from the startup list or hide the notification icons by means of GPO In Windows 8, startup items can be controlled in Task Manager GPO is configured via; Administrative Templates > Start Menu and Taskbar > Hide the notification area The page file is a physical file on the disk where virtual memory can be stored. The page file allows the system to allocate and commit more virtual memory than there is physical memory available. The optimal size of the page file should be determined during pilot testing. The memory-to-committed bytes performance counter can be used to monitor how much committed virtual memory is on the system. When the value of this counter reaches close to the total combined size of physical memory and page file, memory allocation begins to fail. So the physical memory or the page file would need to be increased. The initial size of the page file should be equal to the maximum size of the page file to prevent fragmentation. Note: For more information on determining the appropriate size of the page file, please refer to the Microsoft knowledgebase article - KB and Citrix blog post - The Page File Done right!. Notification icons on the desktop can have fairly expensive refreshing mechanisms. Therefore it is best to disable unnecessary notifications. 9

10 SMB 1.0 Client Optimization Note: Tuning SMB 1.0 is required in mixed environments where Windows 2012 / 8 and Windows 2003 or earlier systems connect. For more information on how to check your SMB version usage, please refer to the Microsoft blog post Which version of the SMB protocol are you using? HKEY_LOCAL_MACHINE\SYSTEM\Cur rentcontrolset\services\lanmanworkstat ion\parameters "MaxCmds"=dword: (dec) HKEY_LOCAL_MACHINE\SYSTEM\Cur rentcontrolset\services\mrxsmb\param eters "MultiUserEnabled"=dword: HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\ CurrentVersion\Policies\Explorer NoRemoteRecursiveEvents =dword: HKEY_LOCAL_MACHINE\SYSTEM\Cur rentcontrolset\services\ Lanmanserver\Parameters "MaxWorkItems"=dword: (dec) "MaxMpxCt"=dword: (dec) "MaxRawWorkItems"=dword: (dec) "MaxFreeConnections"=dword: (dec) "MinFreeConnections"=dword: (dec) File Sharing in a Microsoft Environment is based on an application protocol called Server Message Block (SMB). When a device connects to a Microsoft file share on another computer it is acting as an SMB client. By default the SMB 1.0 Client network redirector can only have 50 outstanding SMB requests/commands open to a single file server. This is controlled by the MaxCmds registry value. All connections to remote servers are per computer and not per user. This means all users on a Terminal Server open files over the same SMB session. A single SMB Client Session can have a maximum of 16,383 open files. This is controlled by the MultiUserEnabled registry value. When a drive is mapped to a UNC path and Windows Explorer is open to the network drive, it will submit an always open SMB command to request notification when a file changes anywhere on the network drive. These are called SMB change notify events. In order to reduce network traffic, resource utilization and SMB commands and to overcome a potential screen flicker issue for certain file sharing scenarios, the policy for NoRemoteRecursiveEvents should be enabled. This Prevents change notifications from being sent for anything other than the root folder. Note: For more information, please refer to the Citrix blog post SMB tuning for XenApp and File Servers on Windows Server

11 SMB 2.x Client Tuning Note: Tuning SMB 2.0 is required in mixed environments where Windows 2012 / 8 and Windows 2008 / 2008 R2 systems connect. For more information on how to check your SMB version usage, please refer to the Microsoft blog post Which version of the SMB protocol are you using? Disable Background Disk Defragmentation 1,2 HKEY_LOCAL_MACHINE\System\Curre ntcontrolset\services\ LanmanWorkstation\Parameters DisableBandwidthThrottling"=dword: DisableLargeMtu =dword: HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\ CurrentVersion\Policies\Explorer NoRemoteRecursiveEvents =dword: [HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Dfrg\BootOptimizeFunction] "Enable"="N" By default, the SMB redirector throttles throughput across high-latency network connections in some cases to avoid network-related timeouts. Setting the DisableBandwidthThrottling registry value to 1 disables this throttling, enabling higher file transfer throughput over high-latency network connections. By default, the SMB redirector does not transfer payloads larger than approximately 64 KB per request. Setting the DisableLargeMtu registry value to 0 enables larger request sizes, which can improve file transfer speed. Note: For more information, please refer to the Citrix blog post SMB tuning for XenApp and File Servers on Windows Server Not required for MCS or PVS based nonpersistent virtual desktops. File system changes are discarded after reboot. Disable Background Auto-Layout 1,2 Disable Superfetch 1,2 Disable System Protection 2 [HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows\CurrentVersion\ OptimalLayout] "EnableAutoLayout"=dword: [HKEY_LOCAL_MACHINE\SYSTEM\Cu rrentcontrolset\services\sysmain] "Start"=dword: The Optimizer tool disables the Superfetch service by registry change. Alternatively the Superfetch service can be disabled in the services dialog. System Properties > System Protection > Configure Not required for MCS or PVS based nonpersistent virtual desktops. File system changes are discarded after reboot. Tries to improve system performance over time by learning the typical user activity. This information is stored within the operating system, which means it is deleted upon each reboot and provides little value in a virtual desktop environment. Windows 8/8.1 should disable the SuperFetch service automatically in pooled virtual desktops. System restore points are lost on reboot using MCS or PVS non-persistent desktops. Should be considered for other scenarios as well to save on disk requirements. Disable Scheduled Local Disk Properties > Tools > Optimize Not required for non-persistent virtual Disk Optimization 2 desktops. File system changes are discarded after reboot. Disable UAC Secure Desktop Prompt [HKEY_LOCAL_MACHINE\Software\Mic rosoft\windows\currentversion\policies\ System] PromptOnSecureDesktop =dword: The secure desktop prompt partially dims the screen and consumes additional CPU and network traffic. Note: Disabling the UAC prompt will reduce security. 11

12 Disable Windows Defender Service Note: In Windows 8 and 8.1 the VDA Optimizer tool will not disable Defender Service. Disable Hibernation 1 Manually on master image: 1. Navigate to Start->Apps- >Windows Defender 2. Go to the settings tab 3. Under the administrator tab uncheck the box labeled Turn on this app Through GPO: Computer Configuration->Administrative Templates->Windows Components- >Windows Defender Turn off Windows Defender Execute powercfg -h off with elevated user rights. Windows Defender can be disabled if using another anti-virus solution. Windows Defender should disable itself if another anti-virus solution is detected. Not required for virtual desktop environments. The hibernation file is unnecessary and requires storage. 1 Optimization applied automatically during XD7 VDA installation as outlined in CTX Table 4: Runtime Optimizations Services Many Windows services within a virtual desktop environment and can be disabled to save resources. Below is a list of potential services to disable in hosted virtual environment. Some of these services are dependent on each other and dependencies should be considered for any required service. Note that some 3 rd party applications may potentially rely on some services so testing should be carried out to ensure no lost functionality. Services can be disabled in the master image (MCS or PVS), on individual desktops, or through Group Policy. Group Policy is the preferred method for large environments for easy rollback and minimal interference to the base image. System Services can be configured under Computer Configuration-> Windows Settings->Security Settings->System Services. Service Name Recommended Configuration Description/Justification Application Experience Application Layer Gateway Service Background Intelligent Transfer Service (BITS) BitLocker Drive Encryption Service Block Level Backup Engine Service Bluetooth Support Service BranchCache Service Consider Disabling Not required in managed corporate environments. Provides support for 3rd party protocol plugins for Internet Connection Sharing. This service is used for mobile devices and is not needed for virtual desktops. Used by Windows Update. Virtual desktops which are based off a PVS or MCS golden image do not typically require this service. Note: This service is required by many 3 rd party applications such as AppSense. If required, consider limiting the bandwidth usage of BITS through GPO. Drive encryption is not typically desired in virtual desktop environments. Windows backup is not typically needed for virtual desktop deployments. Bluetooth support is not typically needed for virtual desktop environments. BrachCache is typically used for network savings to a WAN and is not needed in the virtual desktop environment. 12

13 Computer Browser Service Device Association Service Device Setup Manager Service Diagnostic Policy Services Distributed Link Tracking Client Service Encrypting File System Service Family Safety Service Maintains an updated list of computers on the network and supplies this list to computers designated as browsers. If this service is stopped, this list will not be updated or maintained. If this service is disabled, any services that explicitly depend on it will fail to start. Enables pairing between the system and wired or wireless devices. Enables the detection, download and installation of device-related software. If this service is disabled, devices may be configured with outdated software, and may not work correctly. The Diagnostic Policy Services enables problem detection, troubleshooting and resolution for Windows components. If this service is stopped, diagnostics will no longer function. Unless the diagnostic facilities of Windows is required, this service can be disabled. Maintains links between NTFS files within a computer or across computers in a network. This service may be required for certain editions of AVG Anti-Virus. Provides the core file encryption technology used to store encrypted files on NTFS file system volumes. If this service is stopped or disabled, applications will be unable to access encrypted files. Service provides backwards compatibility to Vista parental control and can be disabled in a virtual corporate environment. Fax Service Disable if fax services are not needed from virtual desktop. Function Discovery Resource Publication Service Home Group Listener Home Group Provider Publishes this computer and resources attached to this computer so they can be discovered over the network. If this service is stopped, network resources will no longer be published and they will not be discovered by other computers on the network. Used to establish Home Groups, not used with virtual machines in a corporate environment Used to establish Home Groups, not used with virtual machines in a corporate environment IP Helper Provides tunnel connectivity using IPv6 transition technologies. Not required unless IPv6 is used within the datacenter. Microsoft iscsi Initiator Service Manages Internet SCSI (iscsi) sessions from this computer to remote iscsi target devices. This should not be needed within a virtual desktop. 13

14 Microsoft Software Shadow Copy Provider Service Consider Disabling (Disable after PVS imaging) Manages software-based volume shadow copies taken by the volume shadow copy service. If this service is stopped, softwarebased volume shadow copies cannot be managed. Do not disable this service if using personal vdisk. This service is often required by other 3 rd party applications. Optimize Drives Drive optimization should be performed on Service 2 the master image during scheduled maintenance. Secure Socket Tunneling Protocol Service Provides support for the Secure Socket Tunneling Protocol (SSTP) to connect to remote computers using VPN. If this service is disabled, users will not be able to use SSTP to access remote servers. Security Center Used to monitor and report security health settings on a system. Sensor Monitoring Service Shell Hardware Detection Service Monitors various sensors in order to expose data and adapt to system and user state. Provides autoplay functionality not typically needed in a virtual desktop environment. SNMP Trap Service Receives trap messages generated by local or remote Simple Network Management Protocol (SNMP) agents and forwards the messages to SNMP management programs running on this computer. If this service is stopped, SNMP-based programs on this computer will not receive SNMP trap messages. May be required for certain monitoring tools. SSDP Discovery Discovers network devices and services that use the SSDP protocol. SSDP discovery is not typically used in corporate environments. SuperFetch 1 (Non-persistent desktops only) All cached files which are used to determine SuperFetch behavior are deleted on pooled desktops. Windows 8 should disabled this service automatically for non-persistent desktops. Telephony Service Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the LAN, on servers that are also running the service. Themes Service Note: Unlike in Windows 7, Desktop Composition does not require the themes service UPnP Device Host Service Provides user experience theme management. In Windows 8 the Desktop Window Manager still runs if the themes service is disabled. Disabling the themes service can alter the appearance of the desktop. (Disables taskbar transparency) Allows UPnP devices to be hosted on the computer. Is dependent on the SSDP Discovery service above. 14

15 Volume Shadow Copy Service Windows Color System Service Windows Connect Now Config Regstrar Service Windows Error Reporting Service Windows Media Player Network Sharing Service Windows Search 1 Consider Disabling (Disable after PVS Imaging) Consider Disabling High User Impact Manages and implements volume shadow copies used for backup and other purposes. If this service is stopped, shadow copies will be unavailable for backup and the backup may fail. Do not disable this service if using personal vdisk. This service is often required by other 3 rd party applications. The WcsPlugInService service hosts thirdparty Windows color system color device model and gamut map model plug-in modules. These plug-in modules are vendor-specific extensions to the Windows color system baseline color device and gamut map models. Not required in virtual desktop environments as virtual machines typically do not use wireless internet. Allows errors to be reported when programs stop working or responding. Also allows logs to be generated for diagnostic and repair services. If this service is stopped, error reporting might not work correctly and results of diagnostic services and repairs might not be displayed. Shares Windows Media Player libraries to other systems. This is typically not required in corporate environments. Remove all files and folders (default is Start Menu and local User Profiles) from index options. Doing so enables user to search for file contents on Windows file servers running the Windows Search service. If this functionality is not required, the Windows Search service can be disabled. Windows Update 1 Depends Not required for PVS or MCS based environments, or if Windows Update has been replaced with an alternative deployment solution. Note that Windows Update can also be configured by group policy as described in the General Recommendations Section below. WLAN Service Not required in virtual desktop environments as virtual machines typically do not use wireless internet. WWAN Service Not required in virtual desktop environments as virtual machines typically do not use wireless internet. Table 5: Windows Services 15

16 Scheduled Tasks Windows includes a large number of scheduled tasks, many of which are enabled by default. These tasks may increase the CPU and memory footprint of the operating system, especially in a virtual desktop environment. Scheduled tasks can be controlled through the master image (MCS or PVS), on each individual desktop, or preferably through Group Policy. For more information on scheduled tasks and group policy please refer to the following Microsoft TechNet article Scheduled Tasks Extension. The following scheduled tasks could potentially be disabled on the virtual desktops. Task Application Experience \ AitAgent Application Experience \ ProgramDataUpdater Application Experience \ StartupAppTask AutoCHK \ Proxy Bluetooth \ UninstallDeviceTask CHKDSK \ Proactive Scan Customer Experience Improvement Program \ Consolidator Customer Experience Improvement Program \ KernelCeipTask Customer Experience Improvement Program \ BthSQM Customer Experience Improvement Program \ Uploader Customer Experience Improvement Program \ UsbCeip Description/Justification Aggregates and uploads Application Telemetry information if opted-in to the Microsoft Customer Experience Improvement Program. Collects program telemetry information if opted-in to the Microsoft Customer Experience Improvement Program Scans startup entries and raises notification to the user if there are too many startup entries. This task collects and uploads autochk SQM data if optedin to the Microsoft Customer Experience Improvement Program. This tasks uninstalls the PnP device associated with a specified Bluetooth service ID. NTFS Volume Health Scan If the user has consented to participate in the Windows Customer Experience Improvement Program, this job collects and sends usage data to Microsoft. The Kernel CEIP (Customer Experience Improvement Program) task collects additional information about the system and sends this data to Microsoft. If the user has not consented to participate in Windows CEIP, this task does nothing. The Bluetooth CEIP (Customer Experience Improvement Program) task collects Bluetooth related statistics and information about your machine and sends it to Microsoft. The information received is used to help improve the reliability, stability, and overall functionality of Bluetooth in Windows. This job sends data about windows based on user participation in the Windows Customer Experience Improvement Program The USB CEIP (Customer Experience Improvement Program) task collects Universal Serial Bus related statistics and information about your machine and sends it to the Windows Device Connectivity engineering group at Microsoft. The information received is used to help improve the reliability, stability, and overall functionality of USB in Windows. If the user has not consented to participate in Windows CEIP, this task does not do anything. 16

17 Diagnosis \ Scheduled DiskDiagnostic \ Microsoft-Windows- DiskDiagnosticDataCollector DiskDiagnostic \ Microsoft-Windows- DiskDiagnosticResolver Defrag \ ScheduledDefrag FileHistory \ File History Location \ Notifications Maintenance \ WinSAT Mobile Broadband Accounts \ MNO Metadata Parser MobilePC \ HotStart PerfTrack \ BackgroundConfigSurveyor Power Efficiency Diagnostics \ AnalyzeSystem RAC \ RacTask RAS \ Mobility Manager Registry \ RegIdleBackup Shell \ FamilySafetyMonitor Shell \ FamilySafetyRefresh SlideShow \ AutoWake SlideShow \ GadgetManager SlideShow \ SessionAgent SlideShow \ SystemDataProviders SystemRestore \ SR TaskScheduler \ IdleMaintenance TPM \ Tpm-Maintenance UPnP \ UPnPHostConfig The Windows Scheduled Maintenance Task performs periodic maintenance of the computer system by fixing problems automatically or reporting them through the Action Center. The Windows Disk Diagnostic reports general disk and system information to Microsoft for users participating in the Customer Experience Program. This task warns users about faults that occur on disks that support Self-Monitoring and Reporting Technology. This task optimizes local storage drives. Protects user files from accidental loss by copying them to a backup location when the system is unattended Location Activity Measures a system's performance and capabilities Mobile Broadband Account Experience Metadata Parser Launches applications configured for Windows HotStart Performance Tracing Idle Task: Background configuration surveyor This task analyzes the system looking for conditions that may cause high energy use. Microsoft Reliability Analysis task to process system reliability data. Provides support for the switching of mobility enabled VPN connections if their underlying interface goes down. Registry Idle Backup Task Initializes Family Safety monitoring and enforcement. Synchronizes the latest settings with the Family Safety website. This task automatically wakes the computer and then puts it to sleep when automatic wake is turned on for a Windows SideShow-compatible device. This task manages and synchronizes metadata for the installed gadgets on a Windows SideShow-compatible device. This task manages the session behavior when multiple user accounts exist on a Windows SideShow-compatible device. This task provides system data for the clock, power source, wireless network strength, and volume on a Windows SideShow-compatible device. This task creates regular system protection points. Maintenance Scheduler Launcher Task This task supports the Trusted Platform Module (TPM) by performing background actions on behalf of the OS. Sets the UPnP service to autostart. 17

18 WDI \ ResolutionHost Windows Backup \ ConfigNotification Windows Defender \ Windows Defender Cache Maintenance The Windows Diagnostic Infrastructure Resolution host enables interactive resolutions for system problems detected by the Diagnostic Policy Service. It is triggered when necessary by the Diagnostic Policy Service in the appropriate user session. If the Diagnostic Policy Service is not running, the task will not run This scheduled task notifies the user that Windows Backup has not been configured. Can be disabled in case an alternative virus and malware protection has been implemented. Windows Defender \ Windows Defender Cleanup Windows Defender \ Windows Defender Scheduled Scan Windows Defender \ Windows Defender Verification Windows Filtering Platform \ BfeOnServiceStartTypeChange Windows Media Sharing \ UpdateLibrary This task adjusts the start type for firewall-triggered services when the start type of the Base Filtering Engine (BFE) is disabled. This task updates the cached list of folders and the security permissions on any new files in a user s shared media library. General Recommendations Table 6: Scheduled Tasks The following items, which are configurable by means of Group Policies, do not provide immediate performance increases but can improve system stability and user experience for virtual desktop implementations. The following optimizations should be applied using default Group Policy settings. Some of these settings can be achieved by disabling the associated service or manually on the virtual machine image. Use Group Policy whenever possible for ease of management. Item Configuration / Registry Key Description/Justification Error Reporting Disable Customer Experience Improvement Program (CEIP) Windows Update Administrative Templates Windows Components Windows Error Reporting Disable Windows Error Reporting: Enabled Administrative Templates System Internet Communication Management Internet Communication Settings Turn off Windows Customer Experience Improvement Program: Enabled Administrative Templates Windows Components Windows Updates Configure Automatic Updates: Administrative Templates Windows Components Windows Updates Remove access to use all Windows Update features Generates application crash dumps to be sent to Microsoft. Should be safe to disable unless troubleshooting application. Minimize background traffic by opting out of diagnostics feedback programs. Windows updates should be performed on the base desktop image and not by users. 18

19 System Restore Administrative templates System System Restore Turn off System Restore: Enabled Not needed due to the nature of desktop virtualization and single image management. Non-persistent desktops do not maintain system restore points. Persistent desktops require additional storage for system restore. Windows Search Note: If Search is not available in Group Policy the.admx file may need to be imported from a machine with Windows Search enabled. For more on Windows Search Policies see Microsoft TechNet article Group Policy For Windows Search Administrative Templates Windows Components Search Prevent Indexing Certain Paths indexing on the machine but enables users to perform searches on Windows file servers running the Windows Search service. If this functionality is not required, the Windows Search service can be disabled. Table 7: General Recommendations - GPO The following general recommendations are configurable by means of registry changes. Item Configuration / Registry Key Description/Justification Increase Service Startup Timeout Redirect or Disable CrashDump 1 (Non-persistent desktop only) Disable Windows Autoupdate 1 [HKEY_LOCAL_MACHINE\SYSTEM\C urrentcontrolset\control] "ServicesPipeTimeout"= dword:0002bf20 To redirect CrashDump: Advanced System Settings->Start Up and Recovery: Complete Memory Dump Dump File Small Memory Dump Small Dump Directory To disable CrashDump: [HKEY_LOCAL_MACHINE\SYSTEM\C urrentcontrolset\control\crashcontrol] "CrashDumpEnabled"= dword: "LogEvent"=dword: "SendAlert"=dword: [HKEY_LOCAL_MACHINE\SOFTWAR E\Microsoft\Windows\CurrentVersion WindowsUpdate\Auto Update] "AUOptions"=dword: "ScheduledInstallDay"=dword: "ScheduledInstallTime"=dword: In certain peak load scenarios Windows services might take longer than 30 seconds to start. This setting increases the timeout value to 10 minutes. On reboot, non-persistent virtual desktops will start from the pristine state and all information about the crash will be wiped. Either redirect the memory dump to a persistent disk or if not required, disable it entirely. Note: The TargetOSOptimizer tool disables the crashdump. Not required for PVS or MCS based environments where updates should be applied on the master image, or if Windows Update has been replaced with an alternative deployment solution. 19

20 Disable Offline Files 1 Hide Hard Error Messages Increase Disk I/O Timeout to 200 seconds [HKEY_LOCAL_MACHINE\SOFTWAR E\Microsoft\Windows\CurrentVersion\N etcache] "Enabled"=dword: [HKEY_LOCAL_MACHINE\System\Cur rentcontrolset\control\windows] ErrorMode =dword: [HKEY_LOCAL_MACHINE\SYSTEM\C urrentcontrolset\services\disk] TimeOutValue =dword:000000c8 Not applicable to virtual desktop scenarios as desktops are never offline. When Windows or an application generates a hard error message, a dialog with the error usually appears with an OK or Continue button. These messages are usually cryptic for the end user and they can cause a session to hang if the user gets disconnected. The system can be configured to suppress these messages by writing them to the Event Log and automatically selecting OK for the user. In peak scenarios the disk may be heavily strained. This setting allows for a timeout of 200 seconds. 1 Optimization applied automatically during XD7 VDA installation as outlined in CTX System Performance Table 8: General Recommendations - Registry The following registry changes can improve system performance and user experience but may have a small impact on the appearance of the desktop. This is done by removing resource intensive animations which in a virtual desktop, can add considerable bandwidth requirements. Note that many of the optimizations below affect the explorer shell and therefore must either be implemented in the Default profile or if using Group Policy Preferences or logon script, they will take effect only upon reboot. For more on customizing the default user profile see Microsoft support article - Customize the default local user profile when preparing an image of Windows. Item Settings Visual Effects to Custom Disable Show translucent selection rectangle Disable Show shadows under windows Disable Animate windows when minimizing and maximizing Disable Animations in the taskbar Configuration / Registry Key [HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Explorer\Visu aleffects] VisualFXSetting =dword: [HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Explorer\Adv anced] ListviewAlphaSelect =dword: [HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Explorer\Adv anced] ListviewShadow =dword: [HKEY_CURRENT_USER \Control Panel\Desktop\WindowMetrics] MinAnimate ="0" [HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Explorer\Adv anced] TaskbarAnimations =dword:

21 Disable Enable Peek Disable Save Taskbar Thumbnail Previews Disable Smooth edges of screen fonts Disable Use drop shadow for icon labels on the desktop Disable the rest of the visual effects Disable Cursor blink [HKEY_CURRENT_USER \Software\Microsoft\Windows\DWM] EnableAeroPeek =dword: [HKEY_CURRENT_USER \Software\Microsoft\Windows\DWM] AlwaysHibernateThumbnails =dword: [HKEY_CURRENT_USER \Control Panel\Desktop] FontSmoothing = 0 [HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Explorer\Adv anced] ListviewShadow =dword: [HKEY_CURRENT_USER \Control Panel\Desktop\] UserPreferencesMask =RegBin: "90,12,01,80" [HKEY_CURRENT_USER \Control Panel\Desktop] CursorBlinkRate = -1 User Experience The following items, which are configurable by means of registry changes, do not provide immediate performance increases but can improve user experience for virtual desktop implementations: Item Configuration / Registry Key Description/Justification Disable the Windows 8 First Logon Animation Disable Internet Explorer First Run Wizard Reduce menu show delay Disable Action Center Turn off Network Location Wizard [HKEY_LOCAL_MACHINE\SOFTWAR E\Microsoft\Windows\CurrentVersion\P olicies\system] EnableFirstLogonAnimation =dword: [HKEY_LOCAL_MACHINE\SOFTWAR E\Policies\Microsoft\Internet Explorer\Main] DisableFirstRunCustomize"=dword: [HKEY_CURRENT_USER\Control Panel\Desktop] MenuShowDelay", "0" [HKEY_CURRENT_USER\Software\Mi crosoft\windows\currentversion\policie s\explorer] HideSCAHealth"=dword: [HKEY_CURRENT_USER \Software\Microsoft\Windows NT\CurrentVersion\Network\NwCategor ywizard\show] Disable the first logon sequence for a user on a Windows 8 machine. Note: This can also be disabled through machine local group policy Administrative Templates->System->Logon Show first sign-in animation Disables the pop-up for Internet Explorer for users first logging onto the machine. Reduces the delay Windows sets for menus. Provides better user experience. Disables the action center icon which may display messages to users that they cannot react to. The network location should not change in a corporate VDI environment and can be confusing for users. For more information, please refer to the Microsoft TechNet article - Turn off the Network Location Wizard. Table 9: User Experience 21

22 Application Optimizations Many commercial applications are not optimized for virtual desktops and can consume excess resources with little or no benefit. Some vendors provide guides on optimizing the performance of applications that can be reviewed to ensure lean and scalable systems: How to optimize Word 2007 and Word 2010 Slow Display Performance Office 2013 Video Performance Check with your application vendor for guidelines on optimizing their application for virtual desktops. In addition, custom internal applications should also be optimized to ensure they do not unnecessarily degrade performance. 22

23 Revision History Revision Change Description Updated By Date 1.0 Initial Document Creation Thomas Berger Amit Ben-Chanoch 2/24/ Corrected typo Andy Baker 1/19/2015 Contributors We would like to thank the Citrix Solutions Lab for providing both hardware and support for the testing as well as EMC for providing the VNX5500 storage array. The following individuals have helped contribute to the making of this guide: Andy Baker Roger LaMarca Martin Zugec Pablo Legorreta Steven Krueger Feedback As we are always looking for ways to improve our content, we welcome and appreciate your feedback. Please provide feedback using the link below. The copyright in this report and all other works of authorship and all developments made, conceived, created, discovered, invented or reduced to practice in the performance of work during this engagement are and shall remain the sole and absolute property of Citrix, subject to a worldwide, non-exclusive license to you for your internal distribution and use as intended hereunder. No license to Citrix products is granted herein. Citrix products must be licensed separately. Citrix warrants that the services have been performed in a professional and workman-like manner using generally accepted industry standards and practices. Your exclusive remedy for breach of this warranty shall be timely re-performance of the work by Citrix such that the warranty is met. THE WARRANTY ABOVE IS EXCLUSIVE AND IS IN LIEU OF ALL OTHER WARRANTIES, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE WITH RESPECT TO THE SERVICES OR PRODUCTS PROVIDED UNDER THIS AGREEMENT, THE PERFORMANCE OF MATERIALS OR PROCESSES DEVELOPED OR PROVIDED UNDER THIS AGREEMENT, OR AS TO THE RESULTS WHICH MAY BE OBTAINED THEREFROM, AND ALL IMPLIED WARRANTIES OF MERCHANTIBILITY, FITNESS FOR A PARTICULAR PURPOSE, OR AGAINST INFRINGEMENT. Citrix liability to you with respect to any services rendered shall be limited to the amount actually paid by you. IN NO EVENT SHALL EITHER PARTY BY LIABLE TO THE OTHER PARTY HEREUNDER FOR ANY INCIDENTAL, CONSEQUENTIAL, INDIRECT OR PUNITIVE DAMAGES (INCLUDING BUT NOT LIMITED TO LOST PROFITS) REGARDLESS OF WHETHER SUCH LIABILITY IS BASED ON BREACH OF CONTRACT, TORT, OR STRICT LIABILITY. Disputes regarding this engagement shall be governed by the internal laws of the State of Florida. 851 West Cypress Creek Road Fort Lauderdale, FL Copyright 2013 Citrix Systems, Inc. All rights reserved. Citrix, the Citrix logo, Citrix ICA, Citrix XenDesktop, and other Citrix product names are trademarks of Citrix Systems, Inc. All other product names, company names, marks, logos, and symbols are trademarks of their respective owners.

Windows 7 Optimization Guide

Windows 7 Optimization Guide Consulting Solutions WHITE PAPER Citrix XenDesktop Windows 7 Optimization Guide For Desktop Virtualization www.citrix.com Contents Contents... 2 Overview... 3 Machine Settings... 3 User Settings... 7 Final

More information

Windows 2008 R2 Optimization Guide

Windows 2008 R2 Optimization Guide Consulting Solutions WHITE PAPER Citrix XenApp Windows 2008 R2 Optimization Guide For Desktop Virtualization with XenApp 6 / 6.5 www.citrix.com Contents Overview... 3 Windows 2008 R2 Configuration... 4

More information

Windows 8 Virtual Desktop Infrastructure image client tuning guide

Windows 8 Virtual Desktop Infrastructure image client tuning guide Windows 8 Virtual Desktop Infrastructure image client tuning guide Microsoft Corporation Published: August 2013 Abstract This guide describes important tuning parameters and settings that you can adjust

More information

Service Name Startup Type Log On As. ActiveX Installer (AxInstSV) Manual Local System. Adaptive Brightness Manual Local Service

Service Name Startup Type Log On As. ActiveX Installer (AxInstSV) Manual Local System. Adaptive Brightness Manual Local Service Did you tweak the Services configuration incorrectly, resulting in a system slowdown or leading to other catastrophe? And you don t remember the original configuration to revert back? You may find the

More information

Sage 100 ERP. Installation and System Administrator s Guide

Sage 100 ERP. Installation and System Administrator s Guide Sage 100 ERP Installation and System Administrator s Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the

More information

Infor Web UI Sizing and Deployment for a Thin Client Solution

Infor Web UI Sizing and Deployment for a Thin Client Solution Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08 Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Introduction... 1 Windows Tuning... 2 Compatibility... 2 Windows User Profiles... 2. Remote User Configuration... 2. Data Execution Prevention...

Introduction... 1 Windows Tuning... 2 Compatibility... 2 Windows User Profiles... 2. Remote User Configuration... 2. Data Execution Prevention... Updated 03/20/12 Windows Tuning Guide for vspace 6 Configuration Recommendations for Windows Introduction NComputing products are designed to extend standard desktop PCs and lower the average cost of computing

More information

Protecting VMs in a Multi-Tenancy Environment

Protecting VMs in a Multi-Tenancy Environment Protecting VMs in a Multi-Tenancy Environment Prepared by: XenServer Engineering www.citrix.com Table of Contents 1. Executive Summary... 3 2. Introduction... 4 3. Preventing Vulnerabilities with XenServer...

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing

More information

Lab Validations: Optimizing Storage for XenDesktop with XenServer IntelliCache Reducing IO to Reduce Storage Costs

Lab Validations: Optimizing Storage for XenDesktop with XenServer IntelliCache Reducing IO to Reduce Storage Costs Lab Validations: Optimizing Storage for XenDesktop with XenServer IntelliCache Reducing IO to Reduce Storage Costs www.citrix.com Table of Contents 1. Introduction... 2 2. Executive Summary... 3 3. Reducing

More information

Getting Started with Vision 6

Getting Started with Vision 6 Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop

More information

Windows Server 2008 R2 Essentials

Windows Server 2008 R2 Essentials Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution

More information

Windows Embedded 7 E versus Windows Embedded 7 P

Windows Embedded 7 E versus Windows Embedded 7 P Windows Embedded 7 E versus Windows Embedded 7 P Applications and Services Development.Net Framework.Net Framework 3.5 SP1.NET Framework 2.0 Client Profile.NET Framework 3.0.NET Framework 3.0 Client Profile.NET

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Vendor: Microsoft Exam Code: 70-687 Exam Name: Microsoft Configuring Windows 8 Exam Version: Demo QUESTION: 1 A company has an Active Directory

More information

XenDesktop Implementation Guide

XenDesktop Implementation Guide Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Automating Windows 7 Installation for Desktop and VDI Environments

Automating Windows 7 Installation for Desktop and VDI Environments Automating Windows 7 Installation for Desktop and VDI Environments Greg Shields Ch apter 8: Integrating Automated Windows 7 Installation into VDI Environments... 122 Ste p Fifteen: Integrating MDT into

More information

System Planning, Deployment, and Best Practices Guide

System Planning, Deployment, and Best Practices Guide www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties

More information

Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide

Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide www.citrix.com Overview XenDesktop offers IT administrators many options in order to implement virtual

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

ICT Professional Optional Programmes

ICT Professional Optional Programmes ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications

More information

User Guide Win7Zilla

User Guide Win7Zilla User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main

More information

VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop

VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop Page 1 of 11 Introduction Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end-user experience and excellent

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4 Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures

IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

SSD Guru. Installation and User Guide. Software Version 1.4

SSD Guru. Installation and User Guide. Software Version 1.4 SSD Guru Installation and User Guide Software Version 1.4 Contents Welcome!............................................................................. 1 Key features.........................................................................

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes

More information

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Microsoft Corporation Published: October 2010 Abstract This step-by-step guide walks you through the

More information

Zinstall HDD User Guide

Zinstall HDD User Guide Zinstall HDD User Guide Thank you for purchasing Zinstall. If you have any questions, issues or problems, please contact us: Toll-free phone: (877) 444-1588 International callers: +1-877-444-1588 Support

More information

By the Citrix Publications Department. Citrix Systems, Inc.

By the Citrix Publications Department. Citrix Systems, Inc. Licensing: Planning Your Deployment By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Windows Embedded Standard 7 (WES7) Administration Guide

Windows Embedded Standard 7 (WES7) Administration Guide Windows Embedded Standard 7 (WES7) Administration Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates

More information

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Configuring XenServer v6.5.0 Service Pack 1 for Graphics

Configuring XenServer v6.5.0 Service Pack 1 for Graphics Contents Introduction... 2 GPU Pass-Through... 2 Guest Support and Constraints... 2 Windows Guests... 2 HVM Linux Guests... 3 NVIDIA GRID vgpu... 3 Available NVIDIA GRID vgpu Types... 4 NVIDIA GRID System

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

Installing and Administering VMware vsphere Update Manager

Installing and Administering VMware vsphere Update Manager Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

User Manual. Document revision 2013.02 (12/2/2013)

User Manual. Document revision 2013.02 (12/2/2013) AVG PC TuneUp User Manual Document revision 2013.02 (12/2/2013) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Please note

More information

Course Outline. ttttttt

Course Outline. ttttttt 1300 86 87246 1300 TO TRAIN 50292 - Administering and Maintaining General Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer, maintain,

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Cisco Unified Workforce Optimization

Cisco Unified Workforce Optimization Cisco Unified Workforce Optimization Desktop Requirements Guide Version 10.5 First Published: June 18, 2014 Last Updated: March 6, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

Cloud Optimize Your IT

Cloud Optimize Your IT Cloud Optimize Your IT Windows Server 2012 The information contained in this presentation relates to a pre-release product which may be substantially modified before it is commercially released. This pre-release

More information

Installation and Administration Guide

Installation and Administration Guide Installation and Administration Guide BlackBerry Collaboration Service Version 12.1 Published: 2015-02-25 SWD-20150225135812271 Contents About this guide... 5 Planning a BlackBerry Collaboration Service

More information

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows

More information

Usrig Microsoft User Account Cards

Usrig Microsoft User Account Cards usrig microsoft noows J. Peter Bruzzese Nick Saccomanno cue* 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents v Table of Contents 1 Navigating Your Windows 7 Environment 5 The Windows

More information

AVG PC TuneUp 2015. User Manual. Document revision 2015.02 (8/25/2014)

AVG PC TuneUp 2015. User Manual. Document revision 2015.02 (8/25/2014) AVG PC TuneUp 2015 User Manual Document revision 2015.02 (8/25/2014) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. 1 Contents...

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE Installation and Administration Guide RSM Web Client and RSM Web Gateway 17 August, 2004 Page 1 Copyright Notice 2004 Sony Corporation.

More information

Configuring and Administering Windows 7

Configuring and Administering Windows 7 Configuring and Administering Windows 7 Length: 5 days Overview This five-day instructor-led course provides students with the knowledge and skills to configure and administer Microsoft Windows 7 as a

More information

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer,

More information

AT&T Global Network Client User s Guide

AT&T Global Network Client User s Guide Version 9.0.2 AT&T Global Network Client User s Guide 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Application Compatibility Best Practices for Remote Desktop Services

Application Compatibility Best Practices for Remote Desktop Services Application Compatibility Best Practices for Remote Desktop Services Introduction Remote Desktop Services in Windows Server 2008 R2 allows Windows Server to be accessed by multiple users concurrently to

More information

Provisioning Server High Availability Considerations

Provisioning Server High Availability Considerations Citrix Provisioning Server Design Considerations Citrix Consulting Provisioning Server High Availability Considerations Overview The purpose of this document is to give the target audience an overview

More information

Configure thin client settings locally

Configure thin client settings locally This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring

More information

Course 50322B: Configuring and Administering Windows 7

Course 50322B: Configuring and Administering Windows 7 Course 50322B: Configuring and Administering Windows 7 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course provides students with the knowledge

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition Administrator's Guide

Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition Administrator's Guide Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition Administrator's Guide APPLICATION VERSION: 8.0 SERVICE PACK 2 Dear User, Thank you for choosing our product. We hope that this documentation

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A Ascent Capture Internet Server 5 Getting Started with Ascent Capture Internet Server 5 10300260-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA. The information

More information

UFR II Driver Guide. UFR II Driver Ver. 2.20 ENG

UFR II Driver Guide. UFR II Driver Ver. 2.20 ENG UFR II Driver Guide UFR II Driver Ver. 2.20 Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG 0 Ot UFR II Driver

More information

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Intel Unite Solution. Standalone User Guide

Intel Unite Solution. Standalone User Guide Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel

More information

Designing and Deploying Connected Device Solutions for Small and Medium Business

Designing and Deploying Connected Device Solutions for Small and Medium Business Designing and Deploying Connected Device Solutions for Small and Medium Business HPATA Connected Devices Study Guide Rev 1.1 Table of Contents 1.1 Describe and recognize common desktop virtualization technologies

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX INSTALL AND CONFIGURATION GUIDE Atlas 5.1 for Microsoft Dynamics AX COPYRIGHT NOTICE Copyright 2012, Globe Software Pty Ltd, All rights reserved. Trademarks Dynamics AX, IntelliMorph, and X++ have been

More information

StarWind iscsi SAN: Configuring Global Deduplication May 2012

StarWind iscsi SAN: Configuring Global Deduplication May 2012 StarWind iscsi SAN: Configuring Global Deduplication May 2012 TRADEMARKS StarWind, StarWind Software, and the StarWind and StarWind Software logos are trademarks of StarWind Software that may be registered

More information

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics

More information